> We count about 40% of our security vulnerabilities to date to have been the direct result of us using C instead of a memory-safe language alternative. This is however a much lower number than the 60-70% that are commonly repeated, originating from a few big companies and projects. If this is because of a difference in counting or us actually having a lower amount of C problems, I cannot tell.
When I counted I got about 55% which is pretty close to the standard 2/3.
When I counted I got about 55% which is pretty close to the standard 2/3.
https://blog.timhutt.co.uk/curl-vulnerabilities-rust/